| [1] |
ZHANG Yufeng,LOU Fang,ZHANG Li.
Security assessment of web applications
based on software attack surface
[J]. J4, 20160101, 38(01): 73-77.
|
| [2] |
LI Junzhe, FU Zhenxin, YANG Honghui, MA Yinping, LI Ruomiao, FAN Chun, .
Design and implementation of a cross-cluster data migration system for computational networks
[J]. Computer Engineering & Science, 2025, 47(05): 775-786.
|
| [3] |
CHEN Xu, CHEN Zixiong, JING Yongjun, WANG Shuyang, SONG Jifei.
A slice-level vulnerability detection method based on hyperbolic graph convolutional neural network
[J]. Computer Engineering & Science, 2025, 47(05): 851-863.
|
| [4] |
HAN Xiao-xuan, ZHOU Wen-an, HAN Zhen.
Vulnerability analysis and verification of 5G-AKA authentication mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2149-2157.
|
| [5] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
| [6] |
CHEN Zi-xiong, CHEN Xu, JING Yong-jun, SONG Ji-fei.
A survey of source code vulnerability detection research based on graph neural networks
[J]. Computer Engineering & Science, 2024, 46(10): 1775-1792.
|
| [7] |
XIAO Di, YU Zhu-yang, LI Min, WANG Lian.
A secure federated learning scheme based on differential privacy and model clustering
[J]. Computer Engineering & Science, 2024, 46(09): 1606-1615.
|
| [8] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
| [9] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(06): 1022-1031.
|
| [10] |
GUO Chen-liang, YAN Shao-hong, ZONG Chen-qi.
Research on parallel acceleration of line cloud privacy attack algorithm
[J]. Computer Engineering & Science, 2024, 46(04): 615-625.
|
| [11] |
LI Yang, YIN Da-peng, MA Zi-qiang , YAO Zi-hao, WEI Liang-gen, .
Cache side-channel attack detection combining decision tree and AdaBoost
[J]. Computer Engineering & Science, 2024, 46(03): 440-452.
|
| [12] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(08): 1393-1404.
|
| [13] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
| [14] |
LI Tong-tong, WANG Shi-rui, ZHANG Yao-fang, WANG Bai-ling, WANG Zi-bo, LIU Hong-ri, .
Multi-dimensional attribute analysis of industrial control system vulnerability
[J]. Computer Engineering & Science, 2023, 45(02): 261-268.
|
| [15] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|